References
[1] Martin Abadi, Joan Feigenbaum, and Joe Kilian. On hiding information from an oracle. In Proceedings of the 19th ACM Symposium on Theory of Computing, pages 195–203. ACM, 1987.
[2] Martin Abadi, Joan Feigenbaum, and Joe Kilian. On hiding information from an oracle. Journal of Computer and Systems Science, 39 (1):21–50, 1989.
[3] L. M. Adleman. An abstract theory of computer viruses. In S. Gold-wasser, editor, Advances in Cryptology—Crypto '88, pages 354–374. Springer-Verlag, 1988. Lecture Notes in Computer Science No. 403.
[4] L. M. Adleman, K. Manders, and G. Miller. On taking roots in finite fields. In Proceedings of the 18th IEEE Symposium on Foundations of Computer Science, pages 175–177, 1977.
[5] Manindra Agarwal, Nitin Saxena, and Neeraj Kayal. PRIMES is in P. Preprint, August 6, 2002.
[6] James P. Anderson. Computer security technology planning study. Technical Report ESD–TR–73–51, USAF Electronic Systems Division, Hanscom AFB, October 1972.
[7] R. Anderson, S. Vaudenay, B. Preneel, and K. Nyberg. The Newton Channel. In Workshop on Information Hiding, pages 151–156, 1996.
[8] Ross Anderson and Markus Kuhn. Tamper resistance—a cautionary note. In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pages 1–11, November 1996.
[9] Ross Anderson, Harry Manifavas, and Chris Sutherland. A practical electronic cash system, 1995. Available from author: Ross.Anderson@cl.cam.ac.uk
.
[10] Ross J. Anderson and Markus Kuhn. Low cost attacks on tamper resistant ...
Get Malicious Cryptography: Exposing Cryptovirology now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.